TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Ask HN: Is Let's Encrypt Harmful?

4 pointsby jan-jakubover 9 years ago
I&#x27;ve just learned about Let&#x27;s Encrypt, and it made me a little bit worried. Now, I&#x27;m afraid (correct me please if I&#x27;m wrong) I cannot easily say if the server I&#x27;m talking to is the one I <i>think</i> I&#x27;m communicating with; the https protocol and SSL certificates are there only to ensure <i>message confidentiality</i>, but not <i>server identity</i>.<p>Here are my questions:<p>1. Is there a way to check in a browser if the current domain&#x27;s certificate has been issued by Let&#x27;s Encrypt?<p>2. Should I trust domains with Let&#x27;s Encrypt-issued certificate less than those with paid certificates with identity validation?<p>Perhaps my questions display lack of understanding of some fundamental concept of SSL. If that&#x27;s the case, I&#x27;m happy to learn!

5 comments

detaroover 9 years ago
Most SSL certificates use the same validation mechanisms as Let&#x27;s Encrypt. Let&#x27;s Encrypt is not less secure than other providers of domain validated (DV) certificates, all they check is that the requester of the certificate has some kind of control over the domain at the time of the request.<p>You couldn&#x27;t trust SSL for owner identity before Let&#x27;s Encrypt either, nothing has changed.<p>If you want stronger guarantees for the identity of the owner, you&#x27;ll have to look for Extended Validation (EV) certificates (Browsers generally show the company name next to the lock in the URL bar). (<a href="https:&#x2F;&#x2F;www.cloudflare.com&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.cloudflare.com&#x2F;</a> as an example, HN or <a href="https:&#x2F;&#x2F;www.amazon.com" rel="nofollow">https:&#x2F;&#x2F;www.amazon.com</a> as examples of sites that <i>don&#x27;t</i> use EV)
评论 #10906542 未加载
Kurnihilover 9 years ago
Your concerns are completly right but there is a catch: Let&#x27;s Encrypt is trying to lower the barrier in money and time to offer encrypted connection between a server and you. Even now there are different level of certificate in the standard, you could notice it when you see the lock icon in your browser turning green or not. Hacker News, for example, doesn&#x27;t offer owner information so it&#x27;s grey; Twitter instead turn green as it uses the most secure certificate.<p>The fact is that when you connect to my website ilikeapple.com in which I write about my experience as a apple farmer, you don&#x27;t need to be sure of my server identity (&#x27;cause you don&#x27;t even know my website) but you could still need message confidentiality (&#x27;cause you don&#x27;t want your rival farmer to know that you are interested in planting apple tree next year).<p>So, don&#x27;t put your credit card number in a site that not offer server identity (Hacker News for example) but don&#x27;t worry too much about the certificate of let&#x27;s Encrypt because are the lower level possible of certificate.<p>P.S. They are working to expand the same concept at &quot;higher grade&quot; certificate but of course is a work in progress (and is not sure it&#x27;s possible)
UnoriginalGuyover 9 years ago
To be honest the whole way the internet has always worked is a little backwards...<p>- HTTP: White background with black text.<p>- Mixed content: &quot;Scary&quot; red cross through it.<p>- Domain verified: Green<p>- Identity verified (EV): Super-green<p>In an ideal world it would work like this:<p>- HTTP &amp; Mixed Content: &quot;Scary&quot; red cross through it (i.e. &quot;unencrypted&quot; or compromised encryption).<p>- Domain verified: White background with black text.<p>- Identity verified (EV): Super green.<p>So DV just becomes the new &quot;normal,&quot; since all it is asserting is that you haven&#x27;t been MitM-ed to the specific domain requested. HTTP becomes the new bad (which it is). And only EV gets the green padlock treatment (i.e. so you look for THAT if you enter personal information).<p>PS - Plus you&#x27;ve always been able to get a Let&#x27;s Encrypt-style certified, just costs you $8 which is easy to get using stolen credit cards.
crapsalotover 9 years ago
2. Should I trust domains with Let&#x27;s Encrypt-issued certificate less than those with paid certificates with identity validation?<p>No...<p>Lets Encrypt should not have the same level of trust as the basic DV level cert from a standard CA.<p>There is a security hole in ACME which is glossed over with handwaving from the fanbois.
cabirumover 9 years ago
<p><pre><code> openssl s_client -connect example.com:443 -quiet </code></pre> prints certificate chain, you&#x27;ll see something like this -<p><pre><code> verify return:1 depth=1 C = US, O = Let&#x27;s Encrypt, CN = Let&#x27;s Encrypt Authority X1 </code></pre> - meaning Let&#x27;s Encrypt is involved.